Following a high-profile security breach, search giant Google begins to phase out in-house use of Microsoft Windows operating systems, according to a report.
<b>Linux Pro Magazine:</b> "The Dé Dup backup utility may not be the most powerful or flexible backup tool out there, but it does have its advantages. Its straightforward interface makes it dead-easy to configure backups, while the support for the Amazon S3 storage back-end is a boon for users looking for unlimited backup storage on the cheap."
<b>The Geek Stuff:</b> "In this article, let us review various tar examples including how to create tar archives (with gzip and bzip compression), extract a single file or directory, view tar archive contents, validate the integrity of tar archives, finding out the difference between tar archive and file system, estimate the size of the tar archives before creating it"
<b>Cyber Cynic:</b> "I've given up on predicting when the zombie movie series staring the undead SCO monster is finally going to stay quietly in its grave Still, this week a jury is deciding whether SCO or Novell owns Unix's intellectual property rights."
Don’t be fooled by a netbook configuration that sounds, well, run-of the-mill. The HP Mini 5102 tops the company's high-end netbook computers, with a price tag to prove it. Is it worth the price?
Many critical business applications now execute in an environment separate from that of the enterprise database server. The database administrator often finds monitoring and performance tuning of these "distributed" applications to be especially difficult. This article looks at common performance issues of distributed applications and presents advice to assist the IBM DB2 database administrator in mitigating performance problems.
The iPad might be dominating the headlines this week, but the security folks at Apple have been busy, too, releasing an update to the QuickTime software that patches 16 vulnerabilities.
<b>ComputerWorld UK: </b>"One of the key thinkers in the free software world is Eben Moglen. He's been the legal brains behind the most recent iterations of the GNU GPL."
Sitting at the heart of every Linux OS distribution is a Linux kernel. When it comes to the upcoming Red Hat Enterprise Linux (RHEL) 6 release, the issue of which kernel is being used is not a cut and dried answer, however.
<b>The Volokh Conspiracy:</b> "Under this new decision, if the government wants get your e-mails, the Fourth Amendment lets the government go to your ISP, wait the seconds it normally takes for the e-mail to be delivered, and then run off copies of your messages."
Bringing two networks together is not always a simple matter. Enterprises that approach it from a purely technical perspective are in for a more complex integration.
<b>Linux Operating System:</b> "Jan Mette (funkyou) passed away of as-yet unknown causes. Jan was a major contributor to the Arch Linux community, the creator of KDEmod and a founding member of the Chakra team."
<b>OSNews:</b> "There are three specific points I want to address to illustrate just how holier-than-thou, hypocritical, and misleading this letter really is."
<b>DeveloperWorks: </b>"A recent addition to Linux's impressive selection of file systems is Ceph, a distributed file system that incorporates replication and fault tolerance while maintaining POSIX compatibility."
<b>Click:</b> "I turned on my laptop running the Ubuntu 10.04 Lucid beta (I think we're still technically on "beta 2") and found more than 100 updates ready for me."
Toshiba's 15.6-inch business notebook doesn't skimp on features, with everything from an old-fashioned RS-232 port to facial recognition software, not to mention a fast Core i7 CPU and Nvidia graphics. Does this $1,349 laptop PC have the right stuff to serve as a desktop replacement?
Using profiles for password management is an effective way to restrict unsolicited database usage. Every DBA should verify the password restrictions and setup an appropriate number of profiles for the groups or types of users within the database.